You are on page 1of 27

CIS 505 Communication Technologies

(Prerequisite: CIS 175)

COURSE DESCRIPTION
This course presents the general trends and topics of the computer communication theory. It provides a
foundation for analysis, design, implementation, and management of computer communication systems.

INSTRUCTIONAL MATERIALS
Required Resources
Stallings, W. (2009). CIS 505: Business Data Communications: Custom edition (6th ed.). Upper Saddle
River, NJ: Prentice Hall.
Supplemental Resources
Books by William Stallings. (2011.). Business Data Communications. General format. Retrieved from
http://williamstallings.com/BusinessDataComm/index.html
IEEE. (2011.). General format. Retrieved from http://www.ieee.org/index.html
National Institute of Standards and Technology. (2011.). General format. Retrieved from
http://www.nist.gov
Sourceforge. (2011.). General format. Retrieved from http://sourceforge.net/
The Internet Engineering Task Force. (n.d.). General format. Retrieved from http://www.ietf.org/

COURSE LEARNING OUTCOMES


1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

Describe the needs of communication networks in a business environment.


Analyze the role of distributed processing in communication networks.
Describe the protocols and foundations of the Internet.
Compare and contrast among local area and wide area network technologies and architectures.
Develop a communication networking infrastructure plan to address and solve a proposed
business problem.
Compare and contrast among data communication technologies that include transmission media,
data link control protocols, and multiplexing.
Evaluate the ethical concerns that communication networks raise in a global context.
Describe the application of network security and network management in communication
technology environments.
Use technology and information resources to research issues in communication networks.
Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 1 of 27

CIS 505 Communication Technologies


WEEKLY COURSE SCHEDULE
The standard requirement for a 4.5 credit hour course is for students to spend 13.5 hours in weekly work.
This includes preparation, activities, and evaluation regardless of delivery mode.
Week
1

Preparation, Activities, and Evaluation

Points

Preparation
Reading(s)
o Chapter 1: Introduction
o Chapter 2: Business Information
Activities

Discussions
Evaluation

10

None

Preparation
Reading(s)
o Chapter 3: Distributed Data Processing
o Chapter 4: The Internet
Activities

Discussions
Evaluation

Assignment 1: Standards Research

10
60

Preparation
Reading(s)
o Chapter 5: TCP IP and OSI
o Chapter 6: Client / Server and Intranet Computing
Activities

Discussions
Evaluation

Assignment 2: Requirements for the Corporate Computing Function

10
60

Preparation
Reading(s)
o Chapter 7: Internet-Based Applications
o Chapter 8: Internet Operation
Activities

Discussions
Evaluation

Case Study 1: Florida Department of Management Services, Part I

10
100

Preparation
Reading(s)
o Chapter 9: LAN Architecture and Protocols
Activities

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 2 of 27

CIS 505 Communication Technologies


Discussions
Evaluation

Assignment 3: Elastic and Inelastic Traffic

10
60

Preparation
Reading(s)
o Chapter 10: Ethernet
o Chapter 11: Wireless LANs
Activities

Discussions
Evaluation

Case Study 2: ING Life

10
100

Preparation

Reading(s)
o Chapter 12: Circuit Switching and Packet Switching
o Chapter 13: Frame Relay and ATM

e-Activity
o Research the Internet for an article, publication, or other
electronic document written in the last 12 months that
discusses the advantages of private networks and the
leading VPN services available to organizations. Be prepared
to discuss.
Activities

Discussions
Evaluation

Case Study 3: Carlson Companies

10
100

Preparation
Reading(s)
o Chapter 14: Wireless WANs
o Chapter 15: Data Transmission
Activities

Discussions
Evaluation

Assignment 4: Services in Your Area

10
60

Preparation

Reading(s)
o Chapter 16: Data Communication Fundamentals
o Chapter 17: Data Link Control and Multiplexing

e-Activity
o Research the Internet for an article, publication, or online
document written in the last 12 months that describes how
DSL and cable modems use multiplexing. Be prepared to
discuss.
Activities

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 3 of 27

CIS 505 Communication Technologies


Discussions
Evaluation

10

Assignment 5: Wireless Technology

10
60

Preparation

Reading(s)
o Chapter 18: Computer and Network Security Threats
o Chapter 19: Computer and Network Security Techniques

e-Activity
o Go to the NIST Website, located at
http://www.nist.gov/index.html, to research technologies that
are currently being used in support of security. Be prepared
to discuss.
Activities

Discussions
Evaluation

11

Term Paper: Networking

10
200

Preparation
Reading(s): None
Activities
Discussions
Evaluation

Final Exam: Chapters 1 through 19

100

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 4 of 27

CIS 505 Communication Technologies


GRADING SCALE GRADUATE
Total Points

% of
Grade

Assignment 1: Standards Research

60

6%

Assignment 2: Requirements for the Corporate Computing Function

60

6%

Assignment 3: Elastic and Inelastic Traffic

60

6%

Assignment 4: Services in Your Area

60

6%

Assignment 5: Wireless Technology

60

6%

Case Study 1: Florida Department of Management Services, Part I

100

10%

Case Study 2: ING Life

100

10%

Case Study 3: Carlson Companies

100

10%

Term Paper: Networking

200

20%

Final Exam: Chapters 1 through 19

100

10%

Assignment

Tests are open book with a 2-hour time limit and may contain multiple choice, true / false, and essay
questions.
Participation (20 discussions worth 5 points apiece)
Note: Week 11 discussions are not graded.
Totals

Points

Percentage

Grade

900 1,000

90% 100%

800 899

80% 89%

700 799

70% 79%

Below 700

Below 70%

100

10%

1,000

100%

Writing Assignments
The objective of the School of Information Systems writing assignments is to promote attitudes and skills
that will improve a students ability to communicate in writing, develop research skills and documentation
techniques, and encourage critical analysis of data and conclusions specific to the course learning
outcomes in the information systems and technology domain.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 5 of 27

CIS 505 Assignments and Rubrics


Assignment 1: Standards Research
Due Week 2 and worth 60 points
The following Website may be used for reference to complete this assignment. The Website represents
an electronic document titled Standards Organizations written by William Stallings (2009), located at
http://www.box.net/shared/9dtnzvwys8/1/15730219/164146343/1.
Write a three to four (3-4) page paper in which you:
1. Select one (1) of the working groups in the IETF or IEEE and briefly summarize what this group is
working on.
2. Justify the need of the IEEE 802 standard used in networking.
3. Evaluate the three (3) standard organizations including IEEE, ISO, and ANSI to determine the
most important for communication technology.
4. Take a position on the need for a federal regulating body of standards such as NIST. Include
supporting evidence to justify your opinion.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the needs of communication networks in a business environment.

Use technology and information resources to research issues in communication networks.

Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
Points: 60
Criteria
1. Select one (1) of the
working groups in the
IETF or IEEE and briefly
summarize what this
group is working on.
Weight: 5%

2. Justify the need of the


IEEE 802 standard used

Assignment 1: Standards Research


Unacceptable
Below 70% F

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

Did not submit or


incompletely
selected one (1) of
the working groups
in the IETF or IEEE
and did not submit
or incompletely
summarized what
this group is
working on.
Did not submit or
incompletely

Partially selected
one (1) of the
working groups in
the IETF or IEEE
and partially
summarized what
this group is working
on.

Satisfactorily
selected one (1) of
the working groups
in the IETF or IEEE
and satisfactorily
summarized what
this group is working
on.

Thoroughly selected
one (1) of the
working groups in
the IETF or IEEE
and thoroughly
summarized what
this group is working
on.

Partially justified the


need of the IEEE

Satisfactorily
justified the need of

Thoroughly justified
the need of the IEEE

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 6 of 27

CIS 505 Assignments and Rubrics


in networking.
Weight: 25%
3. Evaluate the three (3)
standard organizations
including IEEE, ISO, and
ANSI to determine the
most important for
communication
technology.
Weight: 30%

4. Take a position on the


need for a federal
regulating body of
standards such as NIST.
Include supporting
evidence to justify your
opinion.
Weight: 25%

5. 3 references
Weight 5%

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

justified the need of


the IEEE 802
standard used in
networking.
Did not submit or
incompletely
evaluated the three
(3) standard
organizations
including IEEE,
ISO, and ANSI to
determine the most
important for
communication
technology.
Did not submit or
incompletely took a
position on the need
for a federal
regulating body of
standards such as
NIST. Did not
submit or
incompletely
included supporting
evidence to justify
your opinion.
No references
provided

More than 6 errors


present

802 standard used


in networking.

the IEEE 802


standard used in
networking.

802 standard used in


networking.

Partially evaluated
the three (3)
standard
organizations
including IEEE, ISO,
and ANSI to
determine the most
important for
communication
technology.

Satisfactorily
evaluated the three
(3) standard
organizations
including IEEE, ISO,
and ANSI to
determine the most
important for
communication
technology.

Thoroughly
evaluated the three
(3) standard
organizations
including IEEE, ISO,
and ANSI to
determine the most
important for
communication
technology.

Partially took a
position on the need
for a federal
regulating body of
standards such as
NIST. Partially
included supporting
evidence to justify
your opinion.

Satisfactorily took a
position on the need
for a federal
regulating body of
standards such as
NIST. Satisfactorily
included supporting
evidence to justify
your opinion.

Thoroughly took a
position on the need
for a federal
regulating body of
standards such as
NIST. Thoroughly
included supporting
evidence to justify
your opinion.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 7 of 27

CIS 505 Assignments and Rubrics


Assignment 2: Requirements for the Corporate Computing Function
Due Week 3 and worth 60 points
Your new corporate CIO has devised a nine-point mission statement for the company. As one of the
operations managers in the department, you have received a memo on the new policy and an associated
task. The CIO wants to address the new strategy in a three-phase rollout plan and wants your feedback
on LAN and MAN technology. Refer to Table 3.1 in Chapter 3 of the textbook for the nine points of the
mission statement.
Write a three to four (3-4) page paper in which you:
1. From Table 3.1, speculate why the fifth point, Meet information requirements of management, is
in the CIOs list of nine (9) points.
2. Imagine only three (3) points are to be rolled out in the first phase. Evaluate each point to
determine the most important three (3) for the initial rollout phase.
3. Recommend one (1) additional point the CIO should include in order to ensure the topic of
security is addressed in the mission statement. Explain your rationale for the inclusion.
4. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; references must follow APA or school-specific format. Check with your professor for any
additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required page length.

The specific course learning outcomes associated with this assignment are:

Describe the needs of communication networks in a business environment.

Use technology and information resources to research issues in communication networks.

Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
Points: 60
Criteria
1. Speculate why the
fifth point, Meet
information requirements
of management, is in the
CIOs list of nine (9)
points.
Weight: 30%
2. Evaluate each point to
determine the most

Assignment 2: Requirements for the Corporate Computing Function


Unacceptable
Below 70% F

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

Did not submit or


incompletely
speculated why the
fifth point, Meet
information
requirements of
management, is in
the CIOs list of nine
(9) points.
Did not submit or
incompletely

Partially speculated
why the fifth point,
Meet information
requirements of
management, is in
the CIOs list of nine
(9) points.

Satisfactorily
speculated why the
fifth point, Meet
information
requirements of
management, is in
the CIOs list of nine
(9) points.

Partially evaluated
each point to

Satisfactorily
Thoroughly
evaluated each point evaluated each point

Thoroughly
speculated why the
fifth point, Meet
information
requirements of
management, is in
the CIOs list of nine
(9) points.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 8 of 27

CIS 505 Assignments and Rubrics


important three (3) for the
initial rollout phase.
Weight: 30%
3. Recommend one (1)
additional point the CIO
should include in order to
ensure the topic of
security is addressed in
the mission statement.
Explain your rationale for
the inclusion.
Weight: 25%

4. 4 references
Weight: 5%

5. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

evaluated each
point to determine
the most important
three (3) for the
initial rollout phase.
Did not submit or
incompletely
recommended one
(1) additional point
the CIO should
include in order to
ensure the topic of
security is
addressed in the
mission statement.
Did not submit or
incompletely
explained your
rationale for the
inclusion.
No references
provided

More than 6 errors


present

determine the most


important three (3)
for the initial rollout
phase.

to determine the
most important three
(3) for the initial
rollout phase.

to determine the
most important three
(3) for the initial
rollout phase.

Partially
recommended one
(1) additional point
the CIO should
include in order to
ensure the topic of
security is
addressed in the
mission statement.
Partially explained
your rationale for
the inclusion.

Satisfactorily
recommended one
(1) additional point
the CIO should
include in order to
ensure the topic of
security is
addressed in the
mission statement.
Satisfactorily
explained your
rationale for the
inclusion.

Thoroughly
recommended one
(1) additional point
the CIO should
include in order to
ensure the topic of
security is addressed
in the mission
statement.
Thoroughly
explained your
rationale for the
inclusion.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 9 of 27

CIS 505 Assignments and Rubrics


Case Study 1: Florida Department of Management Services, Part I
Due Week 4 and worth 100 points
Read the case study titled Florida Department of Management Services Part I found at the end of
Chapter 5. Refer to the DMS Website, located at http://www.dms.myflorida.com, for further reference.
Write a three to four (3-4) page paper in which you:
1. Analyze the security mechanisms needed to protect the DMS systems from both state employees
and users accessing over the Internet.
2. Critique the transition process performed by the DMS in the case study. Then, recommend two
(2) alternatives to the IP infrastructure or applications not already mentioned in the case study.
3. Critique the merits of the major services found on the DMS Website.
4. Recommend an additional service to add to the DMS Website.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; references must follow APA or school-specific format. Check with your professor for any
additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required page length.

The specific course learning outcomes associated with this assignment are:

Compare and contrast among local area and wide area network technologies and architectures.

Use technology and information resources to research issues in communication networks.

Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
Points: 100
Criteria
1. Analyze the security
mechanisms needed to
protect the DMS systems
from both state
employees and users
accessing over the
Internet.
Weight: 20%

2. Critique the transition


process performed by the
DMS in the case study

Case Study 1: Florida Department of Management Services, Part I


Unacceptable
Below 70% F
Did not submit or
incompletely
analyzed the
security
mechanisms
needed to protect
the DMS systems
from both state
employees and
users accessing
over the Internet.
Did not submit or
incompletely
critiqued the

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

Partially analyzed
the security
mechanisms
needed to protect
the DMS systems
from both state
employees and
users accessing
over the Internet.

Satisfactorily
analyzed the
security mechanisms
needed to protect
the DMS systems
from both state
employees and
users accessing
over the Internet.

Thoroughly analyzed
the security
mechanisms needed
to protect the DMS
systems from both
state employees and
users accessing over
the Internet.

Partially critiqued
the transition
process performed

Satisfactorily
critiqued the
transition process

Thoroughly critiqued
the transition
process performed

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 10 of 27

CIS 505 Assignments and Rubrics


and recommend two (2)
alternatives to the IP
infrastructure or
applications not already
mentioned in the case
study.
Weight: 30%

3. Critique the merits of


the major services found
on the DMS Website.
Weight: 20%
4. Recommend an
additional service to add
to the DMS Website.
Weight: 15%
5. 3 references
Weight: 5%

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

transition process
performed by the
DMS in the case
study and did not
submit or
incompletely
recommended two
(2) alternatives to
the IP infrastructure
or applications not
already mentioned
in the case study.
Did not submit or
incompletely
critiqued the merits
of the major
services found on
the DMS Website.
Did not submit or
incompletely
recommended an
additional service to
add to the DMS
Website.
No references
provided

More than 6 errors


present

by the DMS in the


case study and
partially
recommended two
(2) alternatives to
the IP infrastructure
or applications not
already mentioned
in the case study.

performed by the
DMS in the case
study and
satisfactorily
recommended two
(2) alternatives to
the IP infrastructure
or applications not
already mentioned in
the case study.

by the DMS in the


case study and
thoroughly
recommended two
(2) alternatives to the
IP infrastructure or
applications not
already mentioned in
the case study.

Partially critiqued
the merits of the
major services
found on the DMS
Website.

Satisfactorily
critiqued the merits
of the major services
found on the DMS
Website.

Thoroughly critiqued
the merits of the
major services found
on the DMS Website.

Partially
recommended an
additional service to
add to the DMS
Website.

Satisfactorily
recommended an
additional service to
add to the DMS
Website.

Thoroughly
recommended an
additional service to
add to the DMS
Website.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 11 of 27

CIS 505 Assignments and Rubrics


Assignment 3: Elastic and Inelastic Traffic
Due Week 5 and worth 60 points
Write a three to four (3-4) page paper in which you:
1. Outline a plan for the development of an addressing and naming model in an environment of the
following scenario:
a. Ten (10) departments in a 1,000-employee organization
b. Equal separation by geography
c.
Use a common data center of twenty (20) backend enterprise servers
2. Analyze the functional problems of throughput, delay, and packet loss as it pertains to your plan.
3. Analyze and explain how you would use DNS in your plan.
4. Compose a two-paragraph executive summary highlighting the main points of your plan.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; references must follow APA or school-specific format. Check with your professor for any
additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required page length.

The specific course learning outcomes associated with this assignment are:

Describe the protocols and foundations of the Internet.

Develop a communication networking infrastructure plan to address and solve a proposed


business problem.

Use technology and information resources to research issues in communication networks.

Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
Points: 60
Criteria
1a. Outline a plan for the
development of an
addressing and naming
model in an environment
of ten departments in a
1,000-employee
organization.
Weight: 10%
1b. Outline a plan for the
development of an
addressing and naming

Assignment 3: Elastic and Inelastic Traffic


Unacceptable
Below 70% F
Did not submit or
incompletely
outlined a plan for
the development of
an addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.
Did not submit or
incompletely
outlined a plan for

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

Partially outlined a
plan for the
development of an
addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.

Satisfactorily
outlined a plan for
the development of
an addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.

Thoroughly outlined
a plan for the
development of an
addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.

Partially outlined a
plan for the
development of an

Satisfactorily
outlined a plan for
the development of

Thoroughly outlined
a plan for the
development of an

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 12 of 27

CIS 505 Assignments and Rubrics


model in an environment
of ten departments in a
1,000-employee
organization.
Weight: 10%
1c. Outline a plan for the
development of an
addressing and naming
model in an environment
of ten departments in a
1,000-employee
organization.
Weight:10%
2. Analyze the functional
problems of throughput,
delay, and packet loss as
it pertains to your plan.
Weight: 15%

3. Analyze and explain


how you would use DNS
in your plan.
Weight: 15%
4. Compose a twoparagraph executive
summary highlighting the
main points of your plan.
Weight: 25%

5. 3 references
Weight: 5%

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

the development of
an addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.
Did not submit or
incompletely
outlined a plan for
the development of
an addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.
Did not submit or
incompletely
analyzed the
functional problems
of throughput,
delay, and packet
loss as it pertains to
your plan.
Did not submit or
incompletely
analyzed and
explained how you
would use DNS in
your plan.
Did not submit or
incompletely
composed a twoparagraph
executive summary
highlighting the
main points of your
plan.
No references
provided

More than 6 errors


present

addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.

an addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.

addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.

Partially outlined a
plan for the
development of an
addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.

Satisfactorily
outlined a plan for
the development of
an addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.

Thoroughly outlined
a plan for the
development of an
addressing and
naming model in an
environment of ten
departments in a
1,000-employee
organization.

Partially analyzed
the functional
problems of
throughput, delay,
and packet loss as it
pertains to your
plan.

Satisfactorily
analyzed the
functional problems
of throughput, delay,
and packet loss as it
pertains to your
plan.

Thoroughly analyzed
the functional
problems of
throughput, delay,
and packet loss as it
pertains to your plan.

Partially analyzed
and explained how
you would use DNS
in your plan.

Satisfactorily
analyzed and
explained how you
would use DNS in
your plan.

Thoroughly analyzed
and explained how
you would use DNS
in your plan.

Partially composed
a two-paragraph
executive summary
highlighting the
main points of your
plan.

Satisfactorily
composed a twoparagraph executive
summary
highlighting the main
points of your plan.

Thoroughly
composed a twoparagraph executive
summary highlighting
the main points of
your plan.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 13 of 27

CIS 505 Assignments and Rubrics


Case Study 2: ING Life
Due Week 6 and worth 100 points
Read the case study titled ING Life found at the end of Chapter 7.
Write a three to four (3-4) page paper in which you:
1. Assess the probable difficulties and risks associated with using a public infrastructure such as the
Internet as part of a business solution.
2. Analyze INGs solution for providing security to determine if the solution is adequate or
inadequate. Provide a rationale for your answer.
3. Critique the extranet solution and recommend one (1) change to the solution to provide better
connectivity to brokers.
4. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; references must follow APA or school-specific format. Check with your professor for any
additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required page length.

The specific course learning outcomes associated with this assignment are:

Compare and contrast among local area and wide area network technologies and architectures.

Compare and contrast among data communication technologies that include transmission media,
data link control protocols, and multiplexing.

Use technology and information resources to research issues in communication networks.

Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
Points: 100
Criteria
1. Assess the probable
difficulties and risks
associated with using a
public infrastructure such
as the Internet as part of
a business solution.
Weight: 25%

2. Analyze INGs solution


for providing security to

Case Study 2: ING Life


Unacceptable
Below 70% F
Did not submit or
incompletely
assessed the
probable difficulties
and risks
associated with
using a public
infrastructure such
as the Internet as
part of a business
solution.
Did not submit or
incompletely

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

Partially assessed
the probable
difficulties and risks
associated with
using a public
infrastructure such
as the Internet as
part of a business
solution.

Satisfactorily
assessed the
probable difficulties
and risks associated
with using a public
infrastructure such
as the Internet as
part of a business
solution.

Thoroughly
assessed the
probable difficulties
and risks associated
with using a public
infrastructure such
as the Internet as
part of a business
solution.

Partially analyzed
INGs solution for

Satisfactorily
analyzed INGs

Thoroughly analyzed
INGs solution for

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 14 of 27

CIS 505 Assignments and Rubrics


determine if the solution
is adequate or
inadequate. Provide a
rationale for your answer.
Weight: 30%

3. Critique the extranet


solution and recommend
one (1) change to the
solution to provide better
connectivity to brokers.
Weight: 30%

4. 2 references
Weight: 5%

5. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

analyzed INGs
solution for
providing security to
determine if the
solution is adequate
or inadequate and
did not submit or
incompletely
provided a rationale
for your answer.
Did not submit or
incompletely
critiqued the
extranet solution
and did not submit
or incompletely
recommended one
(1) change to the
solution to provide
better connectivity
to brokers.
No references
provided

More than 6 errors


present

providing security to
determine if the
solution is adequate
or inadequate and
partially provided a
rationale for your
answer.

solution for providing


security to determine
if the solution is
adequate or
inadequate and
satisfactorily
provided a rationale
for your answer.

providing security to
determine if the
solution is adequate
or inadequate and
thoroughly provided
a rationale for your
answer.

Partially critiqued
the extranet solution
and partially
recommended one
(1) change to the
solution to provide
better connectivity
to brokers.

Satisfactorily
critiqued the
extranet solution and
satisfactorily
recommended one
(1) change to the
solution to provide
better connectivity to
brokers.

Thoroughly critiqued
the extranet solution
and thoroughly
recommended one
(1) change to the
solution to provide
better connectivity to
brokers.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 15 of 27

CIS 505 Assignments and Rubrics


Case Study 3: Carlson Companies
Due Week 7 and worth 100 points
Read the case study titled Carlson Companies found at the end of Chapter 10.
Write a three to four (3-4) page paper in which you:
1. Assess how the Carlson SAN approach would be implemented in todays environment.
2. Compare the pros and cons of consolidating data on a SAN central data facility versus the
dispersed arrangement it replaces.
3. Evaluate the issues raised from the Carlson SAN mixing equipment from a number of vendors
and determine the management options for dealing with this type of situation.
4. Justify the reduction of administration and management of storage networking through Carlsons
IP SAN.
5. Assess how cloud computing could be used by Carlson instead of a SAN. Create a diagram using
Visio or its open source alternative software to illustrate the use of cloud computing. Note: The
graphically depicted solution is not included in the required page length.
6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; references must follow APA or school-specific format. Check with your professor for any
additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required page length.

The specific course learning outcomes associated with this assignment are:

Compare and contrast among local area and wide area network technologies and architectures.

Use technology and information resources to research issues in communication networks.

Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
Points: 100
Criteria
1. Assess how the
Carlson SAN approach
would be implemented in
todays environment.
Weight: 15%

2. Compare the pros and


cons of consolidating
data on a SAN central

Case Study 3: Carlson Companies


Unacceptable
Below 70% F
Did not submit or
incompletely
assessed how the
Carlson SAN
approach would be
implemented in
todays
environment.
Did not submit or
incompletely
compared the pros

Fair
70-79% C

Partially assessed
how the Carlson
SAN approach
would be
implemented in
todays
environment.

Proficient
80-89% B

Satisfactorily
assessed how the
Carlson SAN
approach would be
implemented in
todays environment.

Partially compared
Satisfactorily
the pros and cons of compared the pros
consolidating data
and cons of

Exemplary
90-100% A

Thoroughly
assessed how the
Carlson SAN
approach would be
implemented in
todays environment.
Thoroughly
compared the pros
and cons of

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 16 of 27

CIS 505 Assignments and Rubrics


data facility versus the
dispersed arrangement it
replaces.
Weight: 15%

3. Evaluate the issues


raised from the Carlson
SAN mixing equipment
from a number of
vendors and determine
the management options
for dealing with this type
of situation.
Weight: 15%

4. Justify the reduction of


administration and
management of storage
networking through
Carlsons IP SAN.
Weight: 15%

5. Assess how cloud


computing could be used
by Carlson instead of a
SAN. Create a diagram
using Visio or its open
source alternative
software to illustrate the
use of cloud computing.
Weight: 25%

6. 3 references
Weight: 5%

7. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

and cons of
consolidating data
on a SAN central
data facility versus
the dispersed
arrangement it
replaces.
Did not submit or
incompletely
evaluated the
issues raised from
the Carlson SAN
mixing equipment
from a number of
vendors and did not
submit or
incompletely
determined the
management
options for dealing
with this type of
situation.
Did not submit or
incompletely
justified the
reduction of
administration and
management of
storage networking
through Carlsons
IP SAN.
Did not submit or
incompletely
assessed how cloud
computing could be
used by Carlson
instead of a SAN
and did not submit
or incompletely
created a diagram
using Visio or its
open source
alternative software
to illustrate the use
of cloud computing.
No references
provided

More than 6 errors


present

on a SAN central
data facility versus
the dispersed
arrangement it
replaces.

consolidating data
on a SAN central
data facility versus
the dispersed
arrangement it
replaces.

consolidating data on
a SAN central data
facility versus the
dispersed
arrangement it
replaces.

Partially evaluated
the issues raised
from the Carlson
SAN mixing
equipment from a
number of vendors
and partially
determined the
management
options for dealing
with this type of
situation.

Satisfactorily
evaluated the issues
raised from the
Carlson SAN mixing
equipment from a
number of vendors
and satisfactorily
determined the
management
options for dealing
with this type of
situation.

Thoroughly
evaluated the issues
raised from the
Carlson SAN mixing
equipment from a
number of vendors
and thoroughly
determined the
management options
for dealing with this
type of situation.

Partially justified the


reduction of
administration and
management of
storage networking
through Carlsons IP
SAN.

Satisfactorily
justified the
reduction of
administration and
management of
storage networking
through Carlsons IP
SAN.

Thoroughly justified
the reduction of
administration and
management of
storage networking
through Carlsons IP
SAN.

Partially assessed
how cloud
computing could be
used by Carlson
instead of a SAN
and partially created
a diagram using
Visio or its open
source alternative
software to illustrate
the use of cloud
computing.

Satisfactorily
assessed how cloud
computing could be
used by Carlson
instead of a SAN
and satisfactorily
created a diagram
using Visio or its
open source
alternative software
to illustrate the use
of cloud computing.

Thoroughly
assessed how cloud
computing could be
used by Carlson
instead of a SAN and
thoroughly created a
diagram using Visio
or its open source
alternative software
to illustrate the use
of cloud computing.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 17 of 27

CIS 505 Assignments and Rubrics


Assignment 4: Services in Your Area
Due Week 8 and worth 60 points
Research DSL and cable modem services available closest to your community. You may use neighboring
communities or regions if your community does not have access to DSL or cable modem services.
Researched material must be focused on the technical aspects of DSL and cable modem services.
Marketed documents, white papers, or other advertisements may not be used for the completion of this
assignment.
Write a three to four (3-4) page paper in which you:
1. Identify the DSL and cable modem services referenced in this assignment and the region(s) in
which they operate.
2. Create a diagram of the DSL and Cable Modem connections to your ISP, cable organization, and
telecom to your home router using Visio or its open source alternative software. Note: The
graphically depicted solution is not included in the required page length.
3. Compare and evaluate the speeds of DSL and cable modem that you researched.
4. Compare and evaluate the cost of DSL and cable modem that you researched.
5. Compare and evaluate the reliability of DSL and cable modem that you researched.
6. Recommend DSL or cable modem based on the previous comparison and evaluation of services
available closest to your region. Explain your recommendation.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; references must follow APA or school-specific format. Check with your professor for any
additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required page length.

The specific course learning outcomes associated with this assignment are:

Compare and contrast among local area and wide area network technologies and architectures.

Use technology and information resources to research issues in communication networks.

Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
Points: 60
Criteria
1. Identify the DSL and
cable modem services
referenced in this
assignment and the
region(s) in which they
operate.

Assignment 4: Services in Your Area


Unacceptable
Below 70% F
Did not submit or
incompletely
identified the DSL
and cable modem
services referenced
in this assignment

Fair
70-79% C
Partially identified
the DSL and cable
modem services
referenced in this
assignment and the
region(s) in which

Proficient
80-89% B
Satisfactorily
identified the DSL
and cable modem
services referenced
in this assignment
and the region(s) in

Exemplary
90-100% A
Thoroughly identified
the DSL and cable
modem services
referenced in this
assignment and the
region(s) in which

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 18 of 27

CIS 505 Assignments and Rubrics


Weight: 5%

7. 3 references
Weight: 5%

and the region(s) in


which they operate.
Did not submit or
incompletely
created a diagram
of the DSL and
cable modem
connections to your
ISP, cable
organization, and
telecom to your
home router using
Visio or its open
source alternative
software.
Did not submit or
incompletely
compared and
evaluated the
speeds of DSL and
cable modem that
you researched.
Did not submit or
incompletely
compared and
evaluated the cost
of DSL and cable
modem that are
available closest to
your region.
Did not submit or
incompletely
compared and
evaluated the
reliability of DSL
and cable modem
that are available
closest to your
region.
Did not submit or
incompletely
recommended DSL
or cable modem
based on the
previous
comparison and
evaluation of
services available
closest to your
region. Did not
submit or
incompletely
explained your
recommendation.
No references
provided

8. Clarity, writing
mechanics, and

More than 6 errors


present

2. Create a diagram of
the DSL and cable
modem connections to
your ISP, cable
organization, and
telecom to your home
router using Visio or its
open source alternative
software.
Weight: 20%

3. Compare and evaluate


the speeds of DSL and
cable modem that you
researched.
Weight: 15%
4. Compare and evaluate
the cost of DSL and
cable modem that are
available closest to your
region.
Weight: 15%
5. Compare and evaluate
the reliability of DSL and
cable modem that are
available closest to your
region.
Weight: 15%

6. Recommend DSL or
cable modem based on
the previous comparison
and evaluation of
services available closest
to your region. Explain
your recommendation.
Weight: 15%

they operate.

which they operate.

they operate.

Partially created a
diagram of the DSL
and cable modem
connections to your
ISP, cable
organization, and
telecom to your
home router using
Visio or its open
source alternative
software.

Satisfactorily created
a diagram of the
DSL and cable
modem connections
to your ISP, cable
organization, and
telecom to your
home router using
Visio or its open
source alternative
software.

Thoroughly created a
diagram of the DSL
and cable modem
connections to your
ISP, cable
organization, and
telecom to your
home router using
Visio or its open
source alternative
software.

Partially compared
and evaluated the
speeds of DSL and
cable modem that
you researched.

Satisfactorily
compared and
evaluated the
speeds of DSL and
cable modem that
you researched.

Thoroughly
compared and
evaluated the
speeds of DSL and
cable modem that
you researched.

Partially compared
and evaluated the
cost of DSL and
cable modem that
are available closest
to your region.

Satisfactorily
compared and
evaluated the cost of
DSL and cable
modem that are
available closest to
your region.

Thoroughly
compared and
evaluated the cost of
DSL and cable
modem that are
available closest to
your region.

Partially compared
and evaluated the
reliability of DSL and
cable modem that
are available closest
to your region.

Satisfactorily
compared and
evaluated the
reliability of DSL and
cable modem that
are available closest
to your region.

Thoroughly
compared and
evaluated the
reliability of DSL and
cable modem that
are available closest
to your region.

Partially
recommended DSL
or cable modem
based on the
previous
comparison and
evaluation of
services available
closest to your
region. Partially
explained your
recommendation.

Satisfactorily
recommended DSL
or cable modem
based on the
previous comparison
and evaluation of
services available
closest to your
region. Satisfactorily
explained your
recommendation.

Thoroughly
recommended DSL
or cable modem
based on the
previous comparison
and evaluation of
services available
closest to your
region. Thoroughly
explained your
recommendation.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 19 of 27

CIS 505 Assignments and Rubrics


formatting requirements
Weight: 10%

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 20 of 27

CIS 505 Assignments and Rubrics


Assignment 5: Wireless Technology
Due Week 9 and worth 60 points
There are a number of cellular phone companies each serving their own unique geographical areas.
Likewise, they each may use a different technology to transfer communication. Research the pros and
cons 3GL and 4GL technologies and its role in todays applications.
Write a three to four (3-4) page paper in which you:
1. Compare the pros and cons of 3GL and 4GL technology to determine the best uses of 3GL and
4GL technology in todays applications.
2. Describe how an enterprise would use 3GL, 4GL, WWAN, and WIAMX to improve business.
Explain why they would use one (1) solution over the remaining three (3).
3. Analyze the changes in 4GL technology since the printing of the textbook in 2009 and identify
those of importance for a user of 4GL technology.
4. Take a position on the following statement, Wireless application protocol is a necessity for
wireless communication organizations and their users. Then, explain your position with
supporting evidence.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; references must follow APA or school-specific format. Check with your professor for any
additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required page length.

The specific course learning outcomes associated with this assignment are:

Compare and contrast among local area and wide area network technologies and architectures.

Use technology and information resources to research issues in communication networks.

Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
Points: 60
Criteria
1. Compare the pros and
cons of 3GL and 4GL
technology to determine
the best uses of 3GL and
4GL technology in
todays applications.
Weight: 25%

Assignment 5: Wireless Technology


Unacceptable
Below 70% F
Did not submit or
incompletely
compared the pros
and cons of 3GL
and 4GL technology
to determine the
best uses of 3GL
and 4GL technology
in todays
applications.

Fair
70-79% C

Partially compared
the pros and cons of
3GL and 4GL
technology to
determine the best
uses of 3GL and
4GL technology in
todays applications.

Proficient
80-89% B

Satisfactorily
compared the pros
and cons of 3GL and
4GL technology to
determine the best
uses of 3GL and
4GL technology in
todays applications.

Exemplary
90-100% A

Thoroughly
compared the pros
and cons of 3GL and
4GL technology to
determine the best
uses of 3GL and
4GL technology in
todays applications.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 21 of 27

CIS 505 Assignments and Rubrics


2. Describe how an
enterprise would use
3GL, 4GL, WWAN, and
WIAMX to improve
business. Explain why
they would use one (1)
solution over the
remaining three (3).
Weight: 20%

3. Analyze the changes


in 4GL technology since
the printing of the
textbook in 2009 and
identify those of
importance for a user of
4GL technology.
Weight: 20%

4. Take a position on the


following statement,
Wireless application
protocol is a necessity for
wireless communication
organizations and their
users. Then, explain
your position with
supporting evidence.
Weight: 20%

5. 3 references
Weight: 5%

6. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

Did not submit or


incompletely
described how an
enterprise would
use 3GL, 4GL,
WWAN, and
WIAMX to improve
business, and did
not submit or
incompletely
explained why they
would use one (1)
solution over the
remaining three (3).
Did not submit or
incompletely
analyzed the
changes in 4GL
technology since
the printing of the
textbook in 2009
and did not submit
or incompletely
identified those of
importance for a
user of 4GL
technology.
Did not submit or
incompletely took a
position on the
following statement,
Wireless
application protocol
is a necessity for
wireless
communication
organizations and
their users. Then,
did not submit or
incompletely
explained your
position with
supporting
evidence.
No references
provided

More than 6 errors


present

Partially described
how an enterprise
would use 3GL,
4GL, WWAN, and
WIAMX to improve
business, and
partially explained
why they would use
one (1) solution over
the remaining three
(3).

Satisfactorily
described how an
enterprise would use
3GL, 4GL, WWAN,
and WIAMX to
improve business,
and satisfactorily
explained why they
would use one (1)
solution over the
remaining three (3).

Thoroughly
described how an
enterprise would use
3GL, 4GL, WWAN,
and WIAMX to
improve business,
and thoroughly
explained why they
would use one (1)
solution over the
remaining three (3).

Partially analyzed
the changes in 4GL
technology since the
printing of the
textbook in 2009
and partially
identified those of
importance for a
user of 4GL
technology.

Satisfactorily
analyzed the
changes in 4GL
technology since the
printing of the
textbook in 2009 and
satisfactorily
identified those of
importance for a
user of 4GL
technology.

Thoroughly analyzed
the changes in 4GL
technology since the
printing of the
textbook in 2009 and
thoroughly identified
those of importance
for a user of 4GL
technology.

Partially took a
position on the
following statement,
Wireless
application protocol
is a necessity for
wireless
communication
organizations and
their users. Then,
partially explained
your position with
supporting
evidence.

Satisfactorily took a
position on the
following statement,
Wireless application
protocol is a
necessity for
wireless
communication
organizations and
their users. Then,
satisfactorily
explained your
position with
supporting evidence.

Thoroughly took a
position on the
following statement,
Wireless application
protocol is a
necessity for
wireless
communication
organizations and
their users. Then,
thoroughly explained
your position with
supporting evidence.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 22 of 27

CIS 505 Assignments and Rubrics


Term Paper: Networking
Due Week 10 and worth 200 points
Select one (1) of the following topics in which you will base your responses in the form of a term paper:

Network Neutrality

IPv6

Web2.0

WWAN

Wireless Technology

WLAN

Broadband Convergence

DNSSEC

U.S. Telecommunication Policy

WAN

Internet Security

Write a ten to fifteen (10-15) page paper in which you:


1. Compose an executive summary highlighting the papers contents and reasoning for your chosen
topic.
2. Conduct a SWOT analysis by analyzing the strengths, weaknesses, application opportunities,
and threats from competitors of the chosen topic.
3. Evaluate the current ethical and legal concerns surrounding your topic.
4. Select one (1) ethical or legal concern surrounding your topic, take a position on the issue, and
provide rationale.
5. Analyze the improvements over the last two (2) years to your communication technology topic,
and suggest an improvement based on its current usage.
6. Predict the future role of the communication technology youve selected for both personal and
commercial use.
7. Create a diagram that illustrates the communication structure of your chosen technology in Visio
or its open source alternative software. Note: The graphically depicted solution is not included in
the required page length.
8. Use at least eight (8) quality resources in this assignment. Note: Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; references must follow APA or school-specific format. Check with your professor for any
additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required page length.

The specific course learning outcomes associated with this assignment are:

Evaluate the ethical concerns that communication networks raise in a global context.

Use technology and information resources to research issues in communication networks.

Write clearly and concisely about communication networks using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 23 of 27

CIS 505 Assignments and Rubrics


Points: 200
Criteria
1. Compose an executive
summary highlighting the
papers contents and
reasoning for your
chosen topic.
Weight: 5%
2. Conduct a SWOT
analysis by analyzing the
strengths, weaknesses,
application opportunities,
and threats from
competitors of the
chosen topic.
Weight: 15%

3. Evaluate the current


ethical and legal
concerns surrounding
your topic.
Weight: 10%
4. Select one (1) ethical
or legal concern
surrounding your topic,
take a position on the
issue, and provide
rationale.
Weight: 15%

5. Analyze the
improvements over the
last two (2) years to your
communication
technology topic, and
suggest an improvement
based on its current
usage.
Weight: 15%

6. Predict the future role

Term Paper: Networking


Unacceptable
Below 70% F
Did not submit or
incompletely
composed an
executive summary
highlighting the
papers contents
and reasoning for
your chosen topic.
Did not submit or
incompletely
conducted a SWOT
analysis by
analyzing the
strengths,
weaknesses,
application
opportunities, and
threats from
competitors of the
chosen topic.
Did not submit or
incompletely
evaluated the
current ethical and
legal concerns
surrounding your
topic.
Did not submit or
incompletely
selected one (1)
ethical or legal
concern
surrounding your
topic; did not
submit, or
incompletely took a
position on the
issue and did not
submit or
incompletely
provided rationale.
Did not submit or
incompletely
analyzed the
improvements over
the last two (2)
years to your
communication
technology topic, if
any, and did not
submit or
incompletely
suggested an
improvement based
on its current
usage.
Did not submit or

Fair
70-79% C

Proficient
80-89% B

Exemplary
90-100% A

Partially composed
an executive
summary
highlighting the
papers contents
and reasoning for
your chosen topic.

Satisfactorily
composed an
executive summary
highlighting the
papers contents and
reasoning for your
chosen topic.

Thoroughly
composed an
executive summary
highlighting the
papers contents and
reasoning for your
chosen topic.

Partially conducted
a SWOT analysis by
analyzing the
strengths,
weaknesses,
application
opportunities, and
threats from
competitors of the
chosen topic.

Satisfactorily
conducted a SWOT
analysis by
analyzing the
strengths,
weaknesses,
application
opportunities, and
threats from
competitors of the
chosen topic.

Thoroughly
conducted a SWOT
analysis by analyzing
the strengths,
weaknesses,
application
opportunities, and
threats from
competitors of the
chosen topic.

Partially evaluated
the current ethical
and legal concerns
surrounding your
topic.

Satisfactorily
evaluated the
current ethical and
legal concerns
surrounding your
topic.

Thoroughly
evaluated the current
ethical and legal
concerns
surrounding your
topic.

Partially selected
one (1) ethical or
legal concern
surrounding your
topic, partially took a
position on the
issue, and partially
provided rationale.

Satisfactorily
selected one (1)
ethical or legal
concern surrounding
your topic,
satisfactorily took a
position on the
issue, and
satisfactorily
provided rationale.

Thoroughly selected
one (1) ethical or
legal concern
surrounding your
topic, thoroughly
took a position on
the issue, and
thoroughly provided
rationale.

Partially analyzed
the improvements
over the last two (2)
years to your
communication
technology topic, if
any, and partially
suggested an
improvement based
on its current usage.

Satisfactorily
analyzed the
improvements over
the last two (2) years
to your
communication
technology topic, if
any, and
satisfactorily
suggested an
improvement based
on its current usage.

Thoroughly analyzed
the improvements
over the last two (2)
years to your
communication
technology topic, if
any, and thoroughly
suggested an
improvement based
on its current usage.

Partially predicted

Satisfactorily

Thoroughly predicted

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 24 of 27

CIS 505 Assignments and Rubrics


of the communication
technology youve
selected for both
personal and commercial
use.
Weight: 10%
7. Create a diagram that
illustrates the
communication structure
of your chosen
technology in Visio or its
open source alternative
software.
Weight: 15%
8. 8 references
Weight: 5%

9. Clarity, writing
mechanics, and
formatting requirements
Weight: 10%

incompletely
predicted the future
role of the
communication
technology youve
selected for both
personal and
commercial use.
Did not submit or
incompletely
created a diagram
that illustrates the
communication
structure of your
chosen technology
in Visio or its open
source alternative
software.
No references
provided

More than 6 errors


present

the future role of the


communication
technology youve
selected for both
personal and
commercial use.

predicted the future


role of the
communication
technology youve
selected for both
personal and
commercial use.

the future role of the


communication
technology youve
selected for both
personal and
commercial use.

Partially created a
diagram that
illustrates the
communication
structure of your
chosen technology
in Visio or its open
source alternative
software.

Satisfactorily created
a diagram that
illustrates the
communication
structure of your
chosen technology
in Visio or its open
source alternative
software.

Thoroughly created a
diagram that
illustrates the
communication
structure of your
chosen technology in
Visio or its open
source alternative
software.

Does not meet the


required number of
references; some or
all references poor
quality choices.
5-6 errors present

Meets number of
required references;
all references high
quality choices.

Exceeds number of
required references;
all references high
quality choices.

3-4 errors present

0-2 errors present

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 25 of 27

CIS 505 Student Notes


Weekly Course Schedule
The purpose of the course schedule is to give you, at a glance, the required preparation, activities, and
evaluation components of your course. For more information about your course, whether on-ground or
online, access your online course shell.
The expectations for a 4.5 credit hour course are for students to spend 13.5 hours in weekly work. This
time estimate includes preparation, activities, and evaluation regardless of the delivery mode.

Instructional Materials
In order to be fully prepared, obtain a copy of the required textbooks and other instructional materials
prior to the first day of class. When available, Strayer University provides a link to the first three (3)
chapters of your textbook(s) in eBook format. Check your online course shell for availability.
Review the online course shell or check with your professor to determine whether Internet-based
assignments and activities are used in this course.
Instructional materials are obtained through the universitys virtual bookstore and can be accessed
through iCampus: http:bookstore.mbsdirect.net/strayer.htm. Courses with Internet-based assignments
and activities on publisher sites may require the purchase of onetime access codes. When purchasing
used textbooks, a separate access code purchase will be necessary.

Discussions
Students taking this course online are required to post their discussions to a weekly thread in the online
course shell. Respond to at least two (2) other students posts to earn full credit for each discussion. As it
is always possible that you could lose your work due to unforeseen circumstances, you should routinely
save your work in a separate file before posting in the course discussion area.
Professors hold discussions during class time for on-ground students. Check with your professor if any
additional discussion participation is required in the online course shell outside of class hours.

Tests
Tests (quizzes, midterm and final exams, essay exams, lab tests, etc.) are available for student access
and completion through the online course shell. Check the online course shell to determine how you are
expected to take the tests.

Online students are to complete the test by Sunday midnight the week the test is due.

On-ground students are to complete the tests after the material is covered and before the next
class session.

Assignments
A standardized performance grading rubric is a tool your professor will use to evaluate your written
assignments. Review the rubric before submitting assignments that have grading rubrics associated with
them to ensure you have met the performance criteria stated on the rubric.
Grades are based on individual effort. There is no group grading; however, working in groups in the
online or on-ground classroom is acceptable.
Assignments for online students are always submitted through the online course shell. On-ground
professors will inform students on how to submit assignments, whether in paper format or through the
online course shell.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 26 of 27

CIS 505 Student Notes


Resources
The Resource Center navigation button in the online course shell contains helpful links. Strayer University
Library Resources are available here as well as other important information. You should review this area
to find resources and answers to common questions.
Technical support is available for the following:

For technical questions, please contact Strayer Online Technical Support by logging in to your
iCampus account at https://icampus.strayer.edu/login and submitting a case under Student
Center, then Submit Help Ticket. If you are unable to log in to your iCampus account, please
contact Technical Support via phone at (877) 642-2999.

For concerns with your class, please access the Solution Center by logging in to your iCampus
account at https://icampus.strayer.edu/login and submitting a case under Student Center, then
Submit Help Ticket. If you are unable to log in to your iCampus account, please contact the IT
Help Desk at (866) 610-8123 or at mailto:IThelpdesk@Strayer.edu.

TurnItIn.com is an optional online tool to assess the originality of student written work. Check with your
professor for access and use instructions.
The Strayer Policies link on the navigation bar in the online course shell contains academic policies. It is
important that students be aware of these policies.

2012 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information
and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of
Strayer University.
CIS 505 Student Version 1122 (1146 11-30-2011) Final
Page 27 of 27

You might also like